Publication

17 Oct 2003

This report discusses possible cyber capabilities of terrorists and sponsoring nations, describes how computer security vulnerabilities might be exploited through a cyber terror attack on US critical infrastructure and government computer systems, and looks at the possible effects of such an attack.

JavaScript has been disabled in your browser